Ape Curtis Testnet

Tools

Bytecode to Opcode Disassembler

Attempts to decode the low level Contract Bytecodes to Opcodes.

Decoded Bytecode:
  • [0] PUSH1 0x80
  • [1] PUSH1 0x40
  • [2] MSTORE
  • [3] CALLVALUE
  • [4] DUP1
  • [5] ISZERO
  • [6] PUSH2 0x0010
  • [7] JUMPI
  • [8] PUSH1 0x00
  • [9] DUP1
  • [10] REVERT
  • [11] JUMPDEST
  • [12] POP
  • [13] PUSH1 0x04
  • [14] CALLDATASIZE
  • [15] LT
  • [16] PUSH2 0x0057
  • [17] JUMPI
  • [18] PUSH1 0x00
  • [19] CALLDATALOAD
  • [20] PUSH1 0xe0
  • [21] SHR
  • [22] DUP1
  • [23] PUSH4 0x3fb5c1cb
  • [24] EQ
  • [25] PUSH2 0x005c
  • [26] JUMPI
  • [27] DUP1
  • [28] PUSH4 0x639a2858
  • [29] EQ
  • [30] PUSH2 0x008c
  • [31] JUMPI
  • [32] DUP1
  • [33] PUSH4 0x91b7f5ed
  • [34] EQ
  • [35] PUSH2 0x00bc
  • [36] JUMPI
  • [37] DUP1
  • [38] PUSH4 0x98d5fdca
  • [39] EQ
  • [40] PUSH2 0x00ec
  • [41] JUMPI
  • [42] DUP1
  • [43] PUSH4 0xf2c9ecd8
  • [44] EQ
  • [45] PUSH2 0x010a
  • [46] JUMPI
  • [47] JUMPDEST
  • [48] PUSH1 0x00
  • [49] DUP1
  • [50] REVERT
  • [51] JUMPDEST
  • [52] PUSH2 0x0076
  • [53] PUSH1 0x04
  • [54] DUP1
  • [55] CALLDATASIZE
  • [56] SUB
  • [57] DUP2
  • [58] ADD
  • [59] SWAP1
  • [60] PUSH2 0x0071
  • [61] SWAP2
  • [62] SWAP1
  • [63] PUSH2 0x019e
  • [64] JUMP
  • [65] JUMPDEST
  • [66] PUSH2 0x0128
  • [67] JUMP
  • [68] JUMPDEST
  • [69] PUSH1 0x40
  • [70] MLOAD
  • [71] PUSH2 0x0083
  • [72] SWAP2
  • [73] SWAP1
  • [74] PUSH2 0x01d6
  • [75] JUMP
  • [76] JUMPDEST
  • [77] PUSH1 0x40
  • [78] MLOAD
  • [79] DUP1
  • [80] SWAP2
  • [81] SUB
  • [82] SWAP1
  • [83] RETURN
  • [84] JUMPDEST
  • [85] PUSH2 0x00a6
  • [86] PUSH1 0x04
  • [87] DUP1
  • [88] CALLDATASIZE
  • [89] SUB
  • [90] DUP2
  • [91] ADD
  • [92] SWAP1
  • [93] PUSH2 0x00a1
  • [94] SWAP2
  • [95] SWAP1
  • [96] PUSH2 0x019e
  • [97] JUMP
  • [98] JUMPDEST
  • [99] PUSH2 0x013b
  • [100] JUMP
  • [101] JUMPDEST
  • [102] PUSH1 0x40
  • [103] MLOAD
  • [104] PUSH2 0x00b3
  • [105] SWAP2
  • [106] SWAP1
  • [107] PUSH2 0x01d6
  • [108] JUMP
  • [109] JUMPDEST
  • [110] PUSH1 0x40
  • [111] MLOAD
  • [112] DUP1
  • [113] SWAP2
  • [114] SUB
  • [115] SWAP1
  • [116] RETURN
  • [117] JUMPDEST
  • [118] PUSH2 0x00d6
  • [119] PUSH1 0x04
  • [120] DUP1
  • [121] CALLDATASIZE
  • [122] SUB
  • [123] DUP2
  • [124] ADD
  • [125] SWAP1
  • [126] PUSH2 0x00d1
  • [127] SWAP2
  • [128] SWAP1
  • [129] PUSH2 0x019e
  • [130] JUMP
  • [131] JUMPDEST
  • [132] PUSH2 0x014e
  • [133] JUMP
  • [134] JUMPDEST
  • [135] PUSH1 0x40
  • [136] MLOAD
  • [137] PUSH2 0x00e3
  • [138] SWAP2
  • [139] SWAP1
  • [140] PUSH2 0x01d6
  • [141] JUMP
  • [142] JUMPDEST
  • [143] PUSH1 0x40
  • [144] MLOAD
  • [145] DUP1
  • [146] SWAP2
  • [147] SUB
  • [148] SWAP1
  • [149] RETURN
  • [150] JUMPDEST
  • [151] PUSH2 0x00f4
  • [152] PUSH2 0x0176
  • [153] JUMP
  • [154] JUMPDEST
  • [155] PUSH1 0x40
  • [156] MLOAD
  • [157] PUSH2 0x0101
  • [158] SWAP2
  • [159] SWAP1
  • [160] PUSH2 0x01d6
  • [161] JUMP
  • [162] JUMPDEST
  • [163] PUSH1 0x40
  • [164] MLOAD
  • [165] DUP1
  • [166] SWAP2
  • [167] SUB
  • [168] SWAP1
  • [169] RETURN
  • [170] JUMPDEST
  • [171] PUSH2 0x0112
  • [172] PUSH2 0x0180
  • [173] JUMP
  • [174] JUMPDEST
  • [175] PUSH1 0x40
  • [176] MLOAD
  • [177] PUSH2 0x011f
  • [178] SWAP2
  • [179] SWAP1
  • [180] PUSH2 0x01d6
  • [181] JUMP
  • [182] JUMPDEST
  • [183] PUSH1 0x40
  • [184] MLOAD
  • [185] DUP1
  • [186] SWAP2
  • [187] SUB
  • [188] SWAP1
  • [189] RETURN
  • [190] JUMPDEST
  • [191] PUSH1 0x00
  • [192] DUP2
  • [193] PUSH1 0x00
  • [194] DUP2
  • [195] SWAP1
  • [196] SSTORE
  • [197] POP
  • [198] PUSH1 0x00
  • [199] SLOAD
  • [200] SWAP1
  • [201] POP
  • [202] SWAP2
  • [203] SWAP1
  • [204] POP
  • [205] JUMP
  • [206] JUMPDEST
  • [207] PUSH1 0x00
  • [208] DUP2
  • [209] PUSH1 0x01
  • [210] DUP2
  • [211] SWAP1
  • [212] SSTORE
  • [213] POP
  • [214] PUSH1 0x01
  • [215] SLOAD
  • [216] SWAP1
  • [217] POP
  • [218] SWAP2
  • [219] SWAP1
  • [220] POP
  • [221] JUMP
  • [222] JUMPDEST
  • [223] PUSH1 0x00
  • [224] DUP2
  • [225] PUSH1 0x02
  • [226] DUP2
  • [227] SWAP1
  • [228] SSTORE
  • [229] POP
  • [230] PUSH1 0x18
  • [231] PUSH1 0x02
  • [232] SLOAD
  • [233] PUSH2 0x0166
  • [234] SWAP2
  • [235] SWAP1
  • [236] PUSH2 0x01f1
  • [237] JUMP
  • [238] JUMPDEST
  • [239] PUSH1 0x02
  • [240] DUP2
  • [241] SWAP1
  • [242] SSTORE
  • [243] POP
  • [244] PUSH1 0x02
  • [245] SLOAD
  • [246] SWAP1
  • [247] POP
  • [248] SWAP2
  • [249] SWAP1
  • [250] POP
  • [251] JUMP
  • [252] JUMPDEST
  • [253] PUSH1 0x00
  • [254] PUSH1 0x02
  • [255] SLOAD
  • [256] SWAP1
  • [257] POP
  • [258] SWAP1
  • [259] JUMP
  • [260] JUMPDEST
  • [261] PUSH1 0x00
  • [262] DUP1
  • [263] SLOAD
  • [264] SWAP1
  • [265] POP
  • [266] SWAP1
  • [267] JUMP
  • [268] JUMPDEST
  • [269] PUSH1 0x00
  • [270] DUP2
  • [271] CALLDATALOAD
  • [272] SWAP1
  • [273] POP
  • [274] PUSH2 0x0198
  • [275] DUP2
  • [276] PUSH2 0x0280
  • [277] JUMP
  • [278] JUMPDEST
  • [279] SWAP3
  • [280] SWAP2
  • [281] POP
  • [282] POP
  • [283] JUMP
  • [284] JUMPDEST
  • [285] PUSH1 0x00
  • [286] PUSH1 0x20
  • [287] DUP3
  • [288] DUP5
  • [289] SUB
  • [290] SLT
  • [291] ISZERO
  • [292] PUSH2 0x01b0
  • [293] JUMPI
  • [294] PUSH1 0x00
  • [295] DUP1
  • [296] REVERT
  • [297] JUMPDEST
  • [298] PUSH1 0x00
  • [299] PUSH2 0x01be
  • [300] DUP5
  • [301] DUP3
  • [302] DUP6
  • [303] ADD
  • [304] PUSH2 0x0189
  • [305] JUMP
  • [306] JUMPDEST
  • [307] SWAP2
  • [308] POP
  • [309] POP
  • [310] SWAP3
  • [311] SWAP2
  • [312] POP
  • [313] POP
  • [314] JUMP
  • [315] JUMPDEST
  • [316] PUSH2 0x01d0
  • [317] DUP2
  • [318] PUSH2 0x0247
  • [319] JUMP
  • [320] JUMPDEST
  • [321] DUP3
  • [322] MSTORE
  • [323] POP
  • [324] POP
  • [325] JUMP
  • [326] JUMPDEST
  • [327] PUSH1 0x00
  • [328] PUSH1 0x20
  • [329] DUP3
  • [330] ADD
  • [331] SWAP1
  • [332] POP
  • [333] PUSH2 0x01eb
  • [334] PUSH1 0x00
  • [335] DUP4
  • [336] ADD
  • [337] DUP5
  • [338] PUSH2 0x01c7
  • [339] JUMP
  • [340] JUMPDEST
  • [341] SWAP3
  • [342] SWAP2
  • [343] POP
  • [344] POP
  • [345] JUMP
  • [346] JUMPDEST
  • [347] PUSH1 0x00
  • [348] PUSH2 0x01fc
  • [349] DUP3
  • [350] PUSH2 0x0247
  • [351] JUMP
  • [352] JUMPDEST
  • [353] SWAP2
  • [354] POP
  • [355] PUSH2 0x0207
  • [356] DUP4
  • [357] PUSH2 0x0247
  • [358] JUMP
  • [359] JUMPDEST
  • [360] SWAP3
  • [361] POP
  • [362] DUP3
  • [363] PUSH32 0xffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff
  • [364] SUB
  • [365] DUP3
  • [366] GT
  • [367] ISZERO
  • [368] PUSH2 0x023c
  • [369] JUMPI
  • [370] PUSH2 0x023b
  • [371] PUSH2 0x0251
  • [372] JUMP
  • [373] JUMPDEST
  • [374] JUMPDEST
  • [375] DUP3
  • [376] DUP3
  • [377] ADD
  • [378] SWAP1
  • [379] POP
  • [380] SWAP3
  • [381] SWAP2
  • [382] POP
  • [383] POP
  • [384] JUMP
  • [385] JUMPDEST
  • [386] PUSH1 0x00
  • [387] DUP2
  • [388] SWAP1
  • [389] POP
  • [390] SWAP2
  • [391] SWAP1
  • [392] POP
  • [393] JUMP
  • [394] JUMPDEST
  • [395] PUSH32 0x4e487b7100000000000000000000000000000000000000000000000000000000
  • [396] PUSH1 0x00
  • [397] MSTORE
  • [398] PUSH1 0x11
  • [399] PUSH1 0x04
  • [400] MSTORE
  • [401] PUSH1 0x24
  • [402] PUSH1 0x00
  • [403] REVERT
  • [404] JUMPDEST
  • [405] PUSH2 0x0289
  • [406] DUP2
  • [407] PUSH2 0x0247
  • [408] JUMP
  • [409] JUMPDEST
  • [410] DUP2
  • [411] EQ
  • [412] PUSH2 0x0294
  • [413] JUMPI
  • [414] PUSH1 0x00
  • [415] DUP1
  • [416] REVERT
  • [417] JUMPDEST
  • [418] POP
  • [419] JUMP
  • [420] 'fe'(Unknown Opcode)
  • [421] LOG2
  • [422] PUSH5 0x6970667358
  • [423] '22'(Unknown Opcode)
  • [424] SLT
  • [425] SHA3
  • [426] BLOBHASH
  • [427] ORIGIN
  • [428] 'b6'(Unknown Opcode)
  • [429] 'f7'(Unknown Opcode)
  • [430] SDIV
  • [431] 'ac'(Unknown Opcode)
  • [432] PUSH14 0x525f52190322eeab69abb3de1730
  • [433] PUSH18 0xed9449509e0573be390664736f6c63430008
  • [434] MUL
  • [435] STOP
  • [436] CALLER